Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
14-10-2021 10:15
Static task
static1
URLScan task
urlscan1
Sample
https://grapplingwiththefutures.com/css/office365/?email=aWdvci5zYWxhdEBiYXllci5jb20=
Behavioral task
behavioral1
Sample
https://grapplingwiththefutures.com/css/office365/?email=aWdvci5zYWxhdEBiYXllci5jb20=
Resource
win10v20210408
General
-
Target
https://grapplingwiththefutures.com/css/office365/?email=aWdvci5zYWxhdEBiYXllci5jb20=
-
Sample
211014-mamltsggfn
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000086acdad2b717954e9b2cceb182f179600000000002000000000010660000000100002000000090556787bd3e41c73f8c2eba904ee97bb769db48ca5b658843b3a518046ca4cc000000000e8000000002000020000000584eaeb429319876fafd57f86a3e61bdf2057d4b45ec94ec269e9447bab0452b20000000141670abf2406fea17bc4f6ea0ddc5da583231ce0bf17b8f8a21ba0d27183c5940000000e1a6a0da45b249c5e65a4d659c5eff1072136caca8393b1ad115b81216ecc5e8ce146d84314f70883649017f60d2b31b7c49d79871c359ae9cd5ff5c24e416a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "340991131" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0025EF6F-2F44-11EC-B2DB-6AC8DF09D482} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 404b8f3312c1d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000086acdad2b717954e9b2cceb182f1796000000000020000000000106600000001000020000000495d69b0792eb34f220c598036ac2c84f4990e2d7a3463d1e2d16fef51c0fcab000000000e80000000020000200000009f63c9893f5ffea12d4d7e3e22296dc3e3e4ca2155a387c2defec448863a44d320000000a174e28a2059441228646b363c296f09709e14737841d429096f5d5c38304edf40000000f14d198ff8c225b4cd2d55d97abcd8c31b04a0869e28fbf5706ac8cc8e3d3a4276969e1b644074f9651cee562bb88a9dcde1ac8d12170d2eafb22eacdd4208d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "341039717" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b5b03312c1d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "341007726" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 656 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 656 iexplore.exe 656 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 656 wrote to memory of 2792 656 iexplore.exe IEXPLORE.EXE PID 656 wrote to memory of 2792 656 iexplore.exe IEXPLORE.EXE PID 656 wrote to memory of 2792 656 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://grapplingwiththefutures.com/css/office365/?email=aWdvci5zYWxhdEBiYXllci5jb20=1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:656 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
9ecb9076d94bf95e37017b77bf3947be
SHA1d28c25957ba11396d7e942e85ca41184db7d08cf
SHA256979f1133fc2fff66a2bd1714cf546b3c23998644e9a8e50f637bf2c95c262831
SHA51241fb06f7c430d1ac2182d3f2c90785c196d2a0810814d4c6ceb48f3e35928a7131fa37da4dae2ea5b16dfe09ddc39884f36a9b258292b3090eaf8e6ed3343103
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\JUVFAO8R.cookieMD5
f8646469908df5cc0a506d68de3cb32d
SHA1f67050e579e317343e0afb0c5fab4ecd50568207
SHA256ed2a04397c3e08c7ec03a79c5da7cdad6fbe4d776809381d5f1f827c148eba09
SHA512d0eb357fe788f4184b6ae41fd7cdb087a2563823abf31c35e87bcb5cc5a31f50a759c5b282a57153a6fbdbd78404a7217244b3855197d394423112a4e1d3ad1b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SZADB2WG.cookieMD5
77808e662a5a67fb4ce3ae6ab373beff
SHA1c1d3b182f4850c14b04a4db73d0bfe0dbd59ca01
SHA256db545ead6711cd8f9a405c49f7ce04d63d62b99447a1ed907afe829c7649a261
SHA512ff91c222df0efc53e52182744d304e651e45218e471ca9d3ff627429cab737ee29a22f9afdefa924d3728bfaa74f95e7965313467c8ac7bd227426a0c5081fa1
-
memory/656-140-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-122-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-121-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-146-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-123-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-124-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-126-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-127-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-128-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-130-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-131-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-132-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-134-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-135-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-136-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-148-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-115-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-141-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-114-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-143-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-116-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-120-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-137-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-149-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-150-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-154-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-155-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-156-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-162-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-163-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-164-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-165-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-166-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-167-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-168-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-172-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-174-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-175-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-178-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-119-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-118-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/656-144-0x00007FFDE9FC0000-0x00007FFDEA02B000-memory.dmpFilesize
428KB
-
memory/2792-139-0x0000000000000000-mapping.dmp